Analysis

  • max time kernel
    50s
  • max time network
    10s
  • platform
    windows10_x64
  • resource
    win10v200410
  • submitted
    20-04-2020 15:41

General

  • Target

    launch.bat

  • Size

    68B

  • MD5

    fc9df43a0e518e46173810698bb61f2b

  • SHA1

    d349c3a95356d0f97707b79495753bd03653f629

  • SHA256

    d74870a0ba0e9cc7388bef1b4de9c09f6316a9ccf8e3191cdf6809e8032873ad

  • SHA512

    84fec80449e9b5b1ddb150f6bda64b79435a38111273ab57e92a4ceeaa44c4c320eb9e02cc5384dbf281e52c936b14602826c54c8999e9df23cfe7e5800293d0

Malware Config

Signatures

  • Drops startup file 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Maze

    Ransomware family also known as ChaCha.

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops file in Program Files directory 43 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launch.bat"
    1⤵
      PID:2572
      • C:\Windows\system32\regsvr32.exe
        regsvr32 "C:\Users\Admin\AppData\Local\temp\kepstl32.dll"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Users\Admin\AppData\Local\temp\kepstl32.dll"
          3⤵
          • Drops startup file
          • Sets desktop wallpaper using registry
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: EnumeratesProcesses
          • Drops file in Program Files directory
          PID:3688
          • C:\Windows\system32\wbem\wmic.exe
            "C:\rwg\ngbw\..\..\Windows\r\kvwle\lgp\..\..\..\system32\iar\sjl\ixom\..\..\..\wbem\if\jacf\..\..\wmic.exe" shadowcopy delete
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3472
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:4072

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3688-0-0x00000000036A0000-0x00000000036FD000-memory.dmp

      Filesize

      372KB

    • memory/3688-4-0x00000000036A0000-0x00000000036FD000-memory.dmp

      Filesize

      372KB